My NAS Appliance Just Turned Ten Years OldI’ve been waiting a couple of years to write this post. In November, 2015, I bought a Synology RS815 NAS appliance to replace the DIY…Dec 20, 2025Dec 20, 2025
Of Daffy Bastards And Goofy F*cks In The Land Of The Lost: Integration Anti-Patterns From The Dark…Some organizations keep following the same legacy, bad practices even though they know better. They keep doing it right up until the…Nov 22, 2025Nov 22, 2025
Using Curl With SPNEGORecently, I had to setup a SPNEGO example to demonstrate a Kerberos identity integration. The details aren’t important, but I spent a bit…Nov 22, 2025Nov 22, 2025
SOFTWARE SUPPLY CHAIN SECURITY: CI/CD/CT PIPELINES AND SECURITY TOOLS — PART 2This is part two of a two part blog post on Software Supply Chain Security. If you haven’t read Part 1 yet, starting there is recommended.Sep 29, 2025Sep 29, 2025
SOFTWARE SUPPLY CHAIN SECURITY: CI/CD/CT PIPELINES AND SECURITY TOOLS — PART 1IntroductionSep 29, 2025Sep 29, 2025
Practical Business Continuity For The Small OrganizationFor the small business owner, should the power going out mean you can’t make money? Should the computer system going down for 20 minutes…Sep 4, 2024A response icon1Sep 4, 2024A response icon1
Static Credentials Must Not Be Used In The BrowserAuthentication is described in this post.Aug 10, 2024Aug 10, 2024
Datastore Security RequirementsThis post will introduce a generic set of database / datastore security requirements that be used as a starting point when developing a…Aug 10, 2024Aug 10, 2024